Coordinate Systems: Inputs and Outputs

With the various coordinate systems involved in mathematical deduction such as Cartesian, Polar, Cylindrical, and Spherical, the correctness of system application depends on the applicability of human work utilizing any or all of them for morally good results. For example, when building a house, a Psalm begins with the truth that says, “Except the LORD build the house, they labour in vain that build it: except the LORD keep the city, the watchman waketh but in vain” (Ps 127:1). Therefore, Rene Descartes’ famous statement may be analyzed. Descartes said: “cogito ergo sum: I think therefore I am” (Web 1). In saying this, the inventor of the Cartesian coordinate system was asserting that his mind gives him substance. I believe that more accurate is mihi virtutem Dei ergo sum: God gives me strength therefore I am. This is supported by the Biblical Scriptures. The anonymous writer (KJV) of the Book of Hebrews wrote, “For every house is builded by some man; but he that built all things is God” (3:4). The first act that the Most High did, creation, was viewed by Him as good (Ge 1:31). In following His eternally supreme standard, I think that choosing a coordinate system is therefore supported by a truly good purpose for utilizing it. Examples are Cartesian for building a contemporary rectangular home for the homeless (Pro 21:13), Cylindrical for a ship required for national defense and protecting marginalized groups (Ex 22:21-23), and Spherical for determining the shortest distance between two points on the ocean with longitude known so that demanded food suppliers perform their obligations in their appointed time (Ecc 3:1-8).

References

Web 1. (2006). cogito ergo sum. In Livingstone, E.(Ed.), The Concise Oxford Dictionary of the Christian Church: Oxford University Press. Retrieved 2 Dec. 2016, from http://0-www.oxfordreference.com.library.regent.edu/view/10.1093/acref/9780198614425.001.0001/acref-9780198614425-e-1295.

 

Perceptions on Reflections

While reading a book by Clifford A. Pickover called The Physics Devotional, a quote reminded me of the importance of reflecting. Pickover wrote about something that Arnold Arons said about physics. Of Arons, Pickover (2015) wrote:

There is a kind of symbolic relationship here between law and theory. A theory becomes more and more respected and powerful the more phenomena that can be derived from it, and the law describing these phenomena becomes more meaningful and useful if it can be made part of a theory. Thus, Newton’s theory of universal gravitation gained greatly in stature because it enabled one to derive the laws that govern the moon’s motion, known by empirical rules since the days of the Babylonian observers. (p. 8)

Within computer science, for instance, the programmer or software developer goes through the process of designing, creating, testing, and debugging a software or system application. This is how a program becomes made. However, the question of why a program does good or bad is commonly expressed with the notion that truth is a matter of pleasure; that is supposed as a fine replacement for the objective balance. For reference, the United States of America, which produces litigation, confirms that scientifically analytical laws follow propositions. Bo Brinkman and Alton F. Sanders distributed information about the classical popularizer of pleasure as truth, John Stuart Mill. Brinkman and Sanders (2013) claimed, “Laws governing free speech in the United States today are generally consistent with Mill’s view. However, the issue of free speech is not settled” (p. 245). For computer science solutions, optimizing code might not always be the simplest or most effective way for building a successful product, but documentation can guide that process. Therefore, the reader may look to an objective source of ethical documentation about people for an understanding of why a particular software is good or bad.

Among scholars, theology is considered the queen of the sciences; it is a responsibility and a gift. The Book of James (KJV) says, “My brethren, have not the faith of our Lord Jesus Christ, the Lord of glory, with respect of persons” (2:1). This is a prohibition on favoritism for an ethic of fairness for the Jew and the Gentile. Thomas Aquinas theological first way of proving a Creator supports this. Ellen T. Charry wrote that Aquinas (2000) explained,

For it is only when acted upon by the first cause that the intermediate causes will produce the change: if the hand does not move the stick, the stick will not move anything else. Hence one is bound to arrive at some first cause of change not itself being changed by anything, and this is what everybody understands by God. (p. 32)

Thomas Aquinas perceived that the initial state is the origin of the continuum. With a final point, Archimedes would call this a summation. Regardless of the origin, considering the final point as the end of history, Hegel (1956) argued that “The History of the world is none other than the progress of the consciousness of freedom” (p. 19). The Bible challenges that by conserving a story throughout history. The Almighty, spoken on behalf of by the prophet Isaiah (KJV), said, “And who, as I, shall call, and shall declare it, and set it in order for me, since I appointed the ancient people? And the things that are coming, and shall come, let them shew unto them” (Is 44:7). The progress that Hegel mentioned leaves behind truths perceived as irrational for the evolution of validity. Thus, when documenting computer applications, agreement with Hegel would require abandoning whatever causes errors in usefulness according to rationality. However, mainstream physicists who discuss quantum mechanics usually agree that human reason is not always sufficient for understanding the world. The Nazis, for example, were rational in that they had a goal in mind that they thought would be useful to them: creating a master race by destroying the Jews. Therefore, when Arons mentioned that law may be derived from theory, this is in agreement with the mathematical sciences, but it did not embed the assumptions into human perception; empirical observations were considered a stepping stone towards the highest understanding. Therefore, documentation should be valued for what it can help beyond the code. Further, analytically oriented computer scientists should be raised up by reflecting on the big picture when developing applications because doing so provides more contextual understanding.

In the coming weeks, I will work on more courses related to computer science and information systems. That said, there are alternative worldviews in this pluralistic nation that I live among as an American. While that is the case, I do think that I should stay focused on what is straight ahead that is reckoned for me. There may be chronological parameters that allow for people meeting in the middle. Seeking true exegesis for studying the perceptions of others is what I think is the way. Thus, I hope that my comments provide such opportunities over time.

References

Brinkman, W. J., & Sanders, A. F. (2013). Ethics in a Computing Culture. Boston, MA: Cengage Learning.

Charry, E. T., & Aquinas, T. (2000). Inquiring after God by Means of Scientific Study. In Inquiring after God: Classic and Contemporary readings (p. 32). Malden, MA: Blackwell.

Hegel, G. W. (1956). The Philosophy of History.

Pickover, C. A. (2015). The Physics Devotional: Celebrating the Wisdom and Beauty of Physics.

Data Privacy and Protections

For the ongoing discussion of data theory and applications, Science News, an organization that reports research of various subjects, released an article called Theoretical computer science provides answers to data privacy problem. For the purpose of this article, concepts related to the handling of data are discussed, and their applications. Specifically, the purposes that relate data to people are recognizable. Science News (2015) said, “Some data may be trivial, but in many cases, data are deeply personal. They can even influence our insurance premiums or the price we pay for a product online.” An example of a working system model with privacy worked with was reported by Science News as researched by a professor of computer science in Harvard University and former director of the Center of Research on Computation and Society, Salil Vadhan (2015). Described as “differential privacy” (2015), this concept protects data with approximations. With this premise, a series of queries may provide an identifiable pattern; a summation may be reckoned. The calculus of this approximation would then be equivalent to an integral that will produce an exact result. Science News reported that this is defended against by good judgment that would be increasing randomization and taking full care in comparing characteristics across queries (2015). This assessment seems vague because what people view as good judgment depends on initial assumptions about reality.

Although rule utilitarianism, for example, is discussed in contemporary times as a serious ethical concept, there is debate about its efficacy. Bo Brinkman and Alton F. Sanders describe rule utilitarianism. Brinkman and Sanders (2013) said, “In rule utilitarianism, we select a set of rules, and each act is evaluated as to whether it conforms to them” (p. 16). In this case, a rule utilitarian approach might be that the supposedly good judgment of differential privacy is people who may have access will have the keys to accurate information retrieval, and people with incorrect keys will get incorrect values returned to them. In the late 20th century AD, Winslett, et al. (1994) supposed a similar proposal. Winslett et al. (1994) said, “We believe that many of the MLS problems can be resolved by directly addressing the question of what an MLS database means, rather than making syntactic adjustments to avoid semantic problems” (p. 627). This proposal essentially asserted that lying is an effective form of confidentiality for cyber security. Although the supposed truth of relative semantics makes sense for the access key holders for secret information in short term, this causes a failure of integrity. For a historical account, the Apostle Paul discussed the Hebrew Bible. Paul (KJV) said, “As it is written, There is none righteous, no, not one:” (Rom 3:10). This was the view before grace.

As Joachim Biskup showed, lying is not the correct approach. Biskup (2000) said, “The initial belief and the first k-1 answers (lies) would reveal the last secret psi_k.” This is a mathematical statement that reflects a Biblical prophecy. The Son of Man (KJV) said, “Therefore whatsoever ye have spoken in darkness shall be heard in the light; and that which ye have spoken in the ear in closets shall be proclaimed upon the housetops” (Lu 12:3). Therefore, when randomizing data for the purpose of producing lies or untrue information for those who seek unauthorized access to data, I think that more secure concepts require something other than this sort of concept because true information will eventually be revealed, though that may be understood as defense in depth with protections being more understood as unapproachable like the image that a security guard for a crucial represents to attackers, defenders, and other vulnerable groups. Similarly, an available mathematical problem that computers would have difficulty solving would serve as a known defense that would be well defensible in contemporary times.

References

Biskup, J. (2000). For unknown secrecies refusal is better than lying. Data & Knowledge Engineering, 33(1), 1-23. doi:10.1016/S0169-023X(99)00043-9

Brinkman, W. J., & Sanders, A. F. (2013). Ethics in a Computing Culture. Boston, MA: Cengage Learning.

Marianne Winslett, Kenneth Smith, and Xiaolei Qian. 1994. Formal query languages for secure relational databases. ACM Trans. Database Syst. 19, 4 (December 1994), 626-662. DOI=http://0-dx.doi.org.library.regent.edu/10.1145/195664.195675

National Science Foundation. (2015, October 7). Theoretical computer science provides answers to data privacy problem: New tools allow researchers to share and study sensitive data safely by applying ‘differential privacy’. ScienceDaily. Retrieved December 25, 2016 from http://www.sciencedaily.com/releases/2015/10/151007144933.htm

Reflections of Previous Semesters, and Thoughts on Moving Forward

Since January to August, my course schedule has been steady every week except for a couple times when there was a week break during or after the semesters, and more is here. During the Spring and Summer 2016 semesters at Regent University, I experienced an introduction to 8-week accelerated courses. They were very challenging with a promise of gaining knowledge of how I may approach various fields with Biblical thinking. In-depth studies of Christian theology was the start of my journey at Regent after transferring from a local public college. It was the first time that I had ever sat down and read the works of leaders of Christian thought throughout history from St. Anselm to Thomas Aquinas about arguments for the existence of God, and to topics such as friendship, art, and marriage from Biblically-based perspectives both from centuries in the past to our contemporaries such as Aelred of Rievaulx, St. Augustine of Hippo, and Richard J. Foster. I learned the significance of the superior quality of Biblical prophecy with research into Jesus the Christ’s life on earth. Old Testament studies further built on these understandings.

After that, I faced testing with the understanding of this Biblical foundation in the form of applied dialogues in every course from Microeconomics to Introduction to Programming, and from Making of the Christian Leader to Operating Systems. Each course required rapid integration of faith with the study of reason. With these completed, I became accustomed to this eight-week format.

After a business week and a couple weekends for a break between semesters, Fall classes began, this Monday, the 22nd. Interestingly, I enrolled in a Calculus III course for my program that is fifteen weeks in duration. I say so because the study time was estimated for about the same amount of time as the eight-week courses; there is the same study challenge as an eight-week course, but that duration is doubled. Calculus being the study of infinity is a relevant topic for the integration of the Biblical Scriptures. As one of the Psalmists wrote, “But from everlasting to everlasting the LORD’s love is with those who fear him, and his righteousness with their children’s children” (NIV, Ps 103:17). According to Andrew E. Hill and John H. Walton, the relevance of this chapter is related to the agenda of the editor of the Psalms. About what its purpose is, Hill and Walton said, “Critical discussion of God’s forgiving the sins of the nation” (Hill & Walton, 2009, p. 429). The Psalms verse and Hill and Walton stated that God Almighty grants his servants blessings of mercy that are collectively grace. This may be interpreted as the privilege of understanding His justice and infinite wisdom, though that does not mean God, himself, is understood beyond his character. Even when Immanuel walked the earth, God the Father reigned in heaven thus his character is known in the flesh, but his infinite Spirit is not fully known. I think that this may apply to Calculus III well as the concept of infinity may be known, but true infinity is not. It is an appealing dichotomy that may be studied for the purpose of growing in true faith for we all assume something as the basis for our worldviews. While this truth about humanity persists, the study of conceptual theory should continue in my view. Having said that, I have more courses this semester.

In general, my other courses are computer science topics, and they are Database Fundamentals, Ethics for Computer Science, and Distributed and Parallel Programming. Each of these eight-week courses required for my major are what interest me. In particular, the research that may equip me with a purpose-driven education is appealing, and I believe that this is the right path for me. Having said that, as these three eight-week courses are accelerated, I chose them two at a time at most. Towards the halfway completed date of the Fall semester, Database Fundamentals has completion as part of its scheduling whereas the remaining two have the beginning of their scheduled coursework for students. While this is work for me, I believe that any truths that I learn from these courses come from God, so I receive blessings then He receives glory. Therefore, my goal in this study consists of working for God Almighty.

Bibliography

Hill, A. E., & Walton, J. H. (2009). A Survey of the Old Testament (3rd ed.). Grand Rapids, MI, MI: Zondervan Pub. House.